26
1 DoF-Robust Strategies for the K-user Distributed Broadcast Channel with Weak CSI Paul de Kerret and David Gesbert Communication Systems Department, EURECOM, Sophia-Antipolis, France Abstract In this paper 1 we consider the Network MIMO channel under the so-called Distributed Channel State Information at the Transmitters (D-CSIT) configuration. In this setting, the precoder is designed in a distributed manner at each Transmitter (TX) on the basis of the locally available multi-user channel estimate. Although the use of simple Zero-Forcing (ZF) was recently shown to reach the optimal DoF for a Broadcast Channel (BC) under noisy, yet centralized, CSIT, it can turn very inefficient in the distributed setting as the achieved number of Degrees-of-Freedom (DoF) is then limited by the worst CSI accuracy across all TXs. To circumvent this effect, we develop a new robust transmission scheme improving the DoF. A surprising result is uncovered by which, in the regime of so-called weak CSIT, the proposed scheme is shown to achieve the centralized outerbound obtained under a genie-aided centralized setting in which the CSI versions available at all TXs are shared among them. Building upon the insight obtained in the weak CSIT regime, we develop a general D-CSI robust scheme which improves over the DoF obtained by conventional ZF approach in an arbitrary CSI quality regime and is shown to achieve the centralized outerbound in some other practically relevant CSIT configurations. I. I NTRODUCTION Multiple-antennas at the TX can be exploited to serve multiple users at the same time, thus offering a strong DoF improvement over time-division schemes [1]. This DoF improvement is however critically dependent on the accuracy of the CSIT. Indeed, the absence of CSIT is known 1 D. Gesbert and P. de Kerret are supported by the European Research Council under the European Union’s Horizon 2020 research and innovation program (Agreement no. 670896). This paper has been presented in part at the 2016 Information Theory and Applications Workshop and at the 2016 IEEE International Symposium on Information Theory.

1 DoF-Robust Strategies for the K-user Distributed ... · by heterogeneous and imperfect backhaul links, as in the Network MIMO context. Such a setting could in particular be obtained

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: 1 DoF-Robust Strategies for the K-user Distributed ... · by heterogeneous and imperfect backhaul links, as in the Network MIMO context. Such a setting could in particular be obtained

1

DoF-Robust Strategies for the K-user

Distributed Broadcast Channel with Weak CSI

Paul de Kerret and David Gesbert

Communication Systems Department, EURECOM, Sophia-Antipolis, France

Abstract

In this paper1 we consider the Network MIMO channel under the so-called Distributed Channel

State Information at the Transmitters (D-CSIT) configuration. In this setting, the precoder is designed

in a distributed manner at each Transmitter (TX) on the basis of the locally available multi-user channel

estimate. Although the use of simple Zero-Forcing (ZF) was recently shown to reach the optimal DoF

for a Broadcast Channel (BC) under noisy, yet centralized, CSIT, it can turn very inefficient in the

distributed setting as the achieved number of Degrees-of-Freedom (DoF) is then limited by the worst

CSI accuracy across all TXs. To circumvent this effect, we develop a new robust transmission scheme

improving the DoF. A surprising result is uncovered by which, in the regime of so-called weak CSIT,

the proposed scheme is shown to achieve the centralized outerbound obtained under a genie-aided

centralized setting in which the CSI versions available at all TXs are shared among them. Building

upon the insight obtained in the weak CSIT regime, we develop a general D-CSI robust scheme which

improves over the DoF obtained by conventional ZF approach in an arbitrary CSI quality regime and

is shown to achieve the centralized outerbound in some other practically relevant CSIT configurations.

I. INTRODUCTION

Multiple-antennas at the TX can be exploited to serve multiple users at the same time, thus

offering a strong DoF improvement over time-division schemes [1]. This DoF improvement is

however critically dependent on the accuracy of the CSIT. Indeed, the absence of CSIT is known

1D. Gesbert and P. de Kerret are supported by the European Research Council under the European Union’s Horizon 2020

research and innovation program (Agreement no. 670896).

This paper has been presented in part at the 2016 Information Theory and Applications Workshop and at the 2016 IEEE

International Symposium on Information Theory.

Page 2: 1 DoF-Robust Strategies for the K-user Distributed ... · by heterogeneous and imperfect backhaul links, as in the Network MIMO context. Such a setting could in particular be obtained

2

to lead to the complete loss of the DoF improvement in the case of a BC with symmetric users [2].

In the noisy (centralized) CSIT regime, a long standing conjecture by Lapidoth, Shamai, and

Wigger [3] has been recently settled in [4] by showing that a scaling of the CSIT error in P−α

for α ∈ [0, 1] leads to a DoF of 1 + (K − 1)α in the K-user BC.

A different line of work in the area of BC with limited feedback has been focused on the

exploitation of delayed CSI on the TX side. This research area was triggered by the seminal

work from Maddah-Ali and Tse [5] where it was shown that completely outdated CSIT could

still be exploited via a multi-phase protocol involving the retransmission of the interference

generated. While the original model considered completely outdated CSIT, a large number of

works have developed generalized schemes for the case of partially outdated [6], [7], alternating

[8], or evolving CSIT [9], to name just a few.

In all the above literature, however, centralized CSIT is typically assumed, i.e., precoding

is done on the basis of a single imperfect/outdated channel estimate being common at every

transmit antenna. Although meaningful in the case of a BC with a single transmit device, this

assumption can be challenged when the joint precoding is carried out across distant TXs linked

by heterogeneous and imperfect backhaul links, as in the Network MIMO context. Such a setting

could in particular be obtained if the user’s data symbols are cached at the different TXs before

the transmission [10]. In this case, it is expected that the CSI exchange will introduce further

delay and quantization noise such that it becomes necessary to study the impact of TX dependent

CSI noise.

In order to account for TX dependent limited feedback, a distributed CSIT model (here

referred to as D-CSIT) was introduced in [11]. In this model, TX j receives its own multi-

user imperfect estimate H(j) on the basis of which it designs its transmit coefficients, without

additional communications with the other TXs. The finite-SNR performance of regularized ZF

under D-CSIT has been computed in the large system limit in [12] while heuristic robust

precoding schemes have been provided in [13], [14] for practical cellular networks. In [15],

[16], Interference Alignment is studied in a D-CSIT configuration and methods to reduce the

required CSIT gaining at each TX are provided. The DoF achieved with delayed and local CSIT,

which is hence a particular D-CSIT configuration is also studied in several works [17], [18], but

the results provided are restricted to the particular local CSIT configuration considered.

In terms of DoF, it was shown in a previous work [11] that using a conventional ZF precoder

Page 3: 1 DoF-Robust Strategies for the K-user Distributed ... · by heterogeneous and imperfect backhaul links, as in the Network MIMO context. Such a setting could in particular be obtained

3

(regularized or not) leads to a severe DoF degradation caused by the lack of a consistent CSI

shared by the cooperating TXs. A scheme was proposed to lift the DoF in the two-user case but

the scheme was relying on the particular structure of the 2-user case and could not be extended

to more users. In this paper, we further build up on this concept to establish a general strategy

for robust precoding in the distributed setting.

More precisely, the main findings read as follows.

• We show that optimal precoding strategies differ depending on the level of CSI accuracy

available at the TXs. To this end we differentiate a weak CSIT regime where the accuracy

at the least informed TX lies below a specific threshold, from an arbitrary CSIT regime

where such condition does not hold.

• In the weak CSIT regime –which will be defined rigorously below– we obtain the surprising

result that it is possible to reach the centralized outerbound, where the centralized outerbound

is obtained by centralizing all CSI feedback observations across all TXs.

• In the arbitrary CSIT regime, the above D-CSIT robust scheme is extended, helping lift the

DoF substantially above what is achieved by conventional ZF precoding and achieving the

centralized outerbound in several key CSIT configurations.

Notations: We denote the multivariate circularly symmetric complex Gaussian distribution

with zero mean and identity covariance matrix by NC(0, I). We use .= to denote exponential

equality, i.e., we write f(P ).= P x to denote limP→∞

log f(P )logP

= x. The exponential inequalities

≤ and ≥ are defined in the same way. We also use the shorthand notation [K] to denote the set

{1, . . . , K}.

II. SYSTEM MODEL

A. Transmission Model

We study a communication system where K TXs jointly serve K Receivers (RXs) over a

Network (Broadcast) MIMO channel. We consider that each TX is equipped with a single-

antenna. Each RX is also equipped with a single antenna and we further assume that the RXs

have perfect CSI so as to focus on the impact of the imperfect CSI on the TX side.

The signal received at RX i is written as

yi = hHi x + zi (1)

Page 4: 1 DoF-Robust Strategies for the K-user Distributed ... · by heterogeneous and imperfect backhaul links, as in the Network MIMO context. Such a setting could in particular be obtained

4

where hHi ∈ C1×K is the channel to user i, x ∈ CK×1 is the transmitted multi-user signal, and

zi ∈ C is the additive noise at RX i, being independent of the channel and the transmitted signal,

and distributed as NC(0, 1). We further define the channel matrix H , [h1, . . . ,hK ]H ∈ CK×K

and the channel coefficient from TX j to RX i as Hi,j . The channel is assumed to be drawn from

a continuous ergodic distribution such that all the channel matrices and all their sub-matrices

are full rank with probability one.

The transmitted multi-user signal x is obtained from the symbol vector s ∈ Cb×1 having its

elements Independently and Identically Distributed (i.i.d.) according to NC(0, 1), where b is the

number of independent data symbols emitted, through joint precoding.

B. Distributed CSIT Model

The D-CSIT setting differs from the conventional centralized one in that each TX receives a

possibly different (global) CSI based on which it designs its own transmission parameters without

any additional communication to the other TXs. Specifically, TX j receives the imperfect multi-

user channel estimate H(j) = [h(j)1 , . . . , h

(j)K ]H ∈ CK×K where (h

(j)i )H refers to the estimate of

the channel from all TXs to user i, at TX j. TX j then designs its transmit coefficients solely

as a function of H(j) and the statistics of the channel.

Remark 1. It is critical to this work to understand well how the distributed CSIT setting differs

from (embeds) the many different heterogeneous CSIT configurations studied in the literature.

Indeed, an heterogeneous CSIT configuration typically refers to a centralized CSIT configuration

(i.e., with a common channel estimate at all TXs), where each element of the channel is known

with a different quality owing to specific feedback mechanisms. In contrast, the distributed

setting considered here has as many different channel estimates as there are TXs (where each

TX does not have access to the CSIT knowledge at the other TXs), and where different channel

coefficients may also be represented with unequal quality (as in heterogeneous case).

We model the CSI uncertainty at the TXs as

H(j) = H +√P−α(j)∆(j) (2)

where ∆(j) is a random variable with zero mean and bounded covariance matrix. The scalar

α(j) is called the CSIT scaling coefficient at TX j.

Page 5: 1 DoF-Robust Strategies for the K-user Distributed ... · by heterogeneous and imperfect backhaul links, as in the Network MIMO context. Such a setting could in particular be obtained

5

Remark 2. The CSIT scaling coefficient α(j) takes its value in [0, 1] where α(j) = 0 is generally

seen to correspond to a CSIT being useless in terms of DoF. In contrast, α(j) = 1 is usually

equivalent in terms of DoF to a perfect CSIT [4], [19].

The multi-user distributed CSIT configuration is represented through the multi-user CSIT

scaling vector α ∈ RK defined as

α ,

α(1)

...

α(K)

. (3)

For ease of notation, we also define the maximum value of these CSIT scaling coefficients

αmax , maxj∈[K]

α(j). (4)

In addition, we consider that the channel realizations and the channel estimates are drawn in an

i.i.d manner. For a given transmission power P , we further assume that the conditional probability

density functions also verify that

maxH∈CK×K

(pH|H(1),...,H(K)(H)

).=√Pαmax . (5)

Remark 3. This condition extends to the distributed CSIT configuration the condition provided

in [4], which writes in our setting as

maxH∈CK×K

(pH|H(j)(H)

).=√Pα(j) , ∀j ∈ [K]. (6)

Condition (5) is a mild technical assumption, which holds for the distributions usually con-

sidered.

Example 1. We show in the Appendix that condition (5) is satisfied when the noise realiza-

tions ∆(j) ∈ CK×K are i.i.d. according to NC (0K , IK) and all the CSI noise error terms ∆(j)

are independent of each other. �

This D-CSIT setting is illustrated in Fig. 1.

Page 6: 1 DoF-Robust Strategies for the K-user Distributed ... · by heterogeneous and imperfect backhaul links, as in the Network MIMO context. Such a setting could in particular be obtained

6

K TXs

K users

KK x )( Cˆ jH

K x 1H Cih

)( j

s

K Cx

KK x CH

Fig. 1: Network MIMO with Distributed CSIT

C. Degrees-of-Freedom Analysis

Let us denote by C(P ) the sum capacity of the D-CSIT network MIMO channel above. The

optimal sum DoF in this distributed CSIT scenario is denoted by DoFDCSI(α) and defined by

DoFDCSI(α) , limP→∞

C(P )

log2(P ). (7)

III. A TOY EXAMPLE

We start by presenting a simple transmission scheme in a Toy-example as it contains some

important features of the setting and allows to convey the main intuition in a clear manner. This

motivating scheme will then be improved to obtain the results in Section IV.

Let us then consider a 3-user setting in which α(1) = 0.1, α(2) = 0, and α(3) = 0. We will

show how it is possible to achieve the DoF of 1 + 2α(1) = 1.2, which is the value of the DoF

that would be achieved in a centralized setting with TX 2 and TX 3 having received the same

Page 7: 1 DoF-Robust Strategies for the K-user Distributed ... · by heterogeneous and imperfect backhaul links, as in the Network MIMO context. Such a setting could in particular be obtained

7

estimate as TX 1 [19]. In fact, it will be rigorously shown in Section IV that the DoF obtained

when forming such a centralized setting is always an outerbound.

A. Encoding

The transmission scheme consists in a single channel use during which 3 private data symbols

of rate α(1) log2(P ) bits are sent to each user (thus leading to 9 data symbols being sent in one

channel use), while an additional common data symbol of rate (1−α(1)) log2(P ) bits is broadcast

from TX 1 to all users using superposition coding [20]. Note that the information contained in

this common data symbol is not only composed of “fresh” information bits destined to one user,

but is also composed of side information necessary for the decoding of the private data symbols,

as will be detailed below.

The transmitted signal x ∈ C3 is then equal to

x = s1 + s2 + s3 +

1

0

0

s0 (8)

where

• si ∈ C3 is a vector containing private data symbols destined to user i, with power Pα(1)/3

and rate α(1) log2(P ) bits.

• s0 is the common data symbol transmitted by TX 1 only and destined to all users, with

power P − Pα(1) and rate (1− α(1)) log2(P ) bits.

The signal received at user i is then equal to

yi=Hi,1s0︸ ︷︷ ︸.=P

+ hHi s1︸ ︷︷ ︸.=Pα

(1)

+ hHi s2︸ ︷︷ ︸.=Pα

(1)

+ hHi s3︸ ︷︷ ︸.=Pα

(1)

(9)

where we have written under the bracket the power scaling, and where the noise term has been

neglected for clarity. The received signals at the users during this transmission are illustrated in

Fig. 2.

B. Interference Estimation and Quantization at TX 1

The key element of the scheme is that the common data symbol s0 is used to convey side

information allowing each user to decode their desired data symbols. More specifically, TX 1

Page 8: 1 DoF-Robust Strategies for the K-user Distributed ... · by heterogeneous and imperfect backhaul links, as in the Network MIMO context. Such a setting could in particular be obtained

8

Pα(1)

P

3H12

H11

H101,1 shshsh sH 3

H22

H21

H201,2 shshsh sH 3

H32

H31

H301,3 shshsh sH

P1-α(1)

RX 3RX 2RX 1

Fig. 2: Illustration of the received signals at the users.

uses its local CSIT H(1) to estimate the interference terms (h(1)i )Hsk∀i, k, k 6= i, quantize them,

and then transmit them using the common data symbol s0. Each interference term is quantized

using α(1) log2(P ) bits such that the quantization noise remains at the noise floor. Hence, the

transmission of all the quantized estimated interference terms requires to transmit 6α(1) log2(P )

bits.

These 6α(1) log2(P ) bits can be transmitted via the data symbol s0 if 6α(1) log2(P ) ≤ (1 −

α(1)) log2(P ), which is the case for the example considered here. It the inequality is strict,

the data symbol s0 transmits some additional (1 − 7α(1)) log2(P ) fresh information bits to any

particular user.

C. Decoding and DoF Analysis

It remains to verify that this scheme leads to the claimed DoF. Let us consider without loss of

generality the decoding at user 1 as the decoding at the other users will follow with a circular

permutation of the user’s indices. Note that signals at the noise floor will be systematically

omitted.

Using successive decoding [20], the data symbol s0 is decoded first, followed by the data

symbol s1. The data symbol s0 of rate of (1−α(1)) log2(P ) bits can be decoded with a vanishing

probability of error as its SINR can be seen in (9) to scale in P 1−α(1) .

Upon decoding s0, the estimated interferences (h(1)1 )Hs2 are obtained (up to the quantization

Page 9: 1 DoF-Robust Strategies for the K-user Distributed ... · by heterogeneous and imperfect backhaul links, as in the Network MIMO context. Such a setting could in particular be obtained

9

noise at the noise floor, which is thus omitted). It remains to evaluate the impact over the DoF

of the imperfect estimation at TX 1:

(h(1)1 )Hs2 = hH

1 s2 +√P−α(1)(δ

(1)1 )Hsk︸ ︷︷ ︸

.=P 0

. (10)

It follows from (10) that the interference terms can be suppressed up to the noise floor at RX 1

using the quantized estimated interference terms received.

After having subtracted the quantized interference terms, the remaining signal at user 1 is then

y1 = hH1 s1. (11)

Using this signal in combination with the estimated interference terms (h(1)2 )Hs1 and (h

(1)3 )Hs1

obtained through s0, user 1 forms a virtual received vector yv1 ∈ C3 defined as

yv1 ,

hH

1

(h(1)2 )H

(h(1)3 )H

s1. (12)

Each component of yv1 has a SINR scaling in Pα(1) such that user 1 can decode with a vanishing

error probability its destined 3 data symbols having each the rate α(1) log2(P ) bits.

Considering the 3 users, it is possible to transmit in one channel use 9α(1) log2(P ) bits and

(1− 7α(1)) log2(P ) bits (through the data symbol s0), which yields a sum DoF of 1 + 2α(1).

It can be easily seen that this scheme is able to achieve the optimal DoF 1 + 2α(1) as long as

α(1) ≤ 1/7. In Section IV, this scheme will be improved by introducing some ZF precoding to

reduce the amount of interference to retransmit, thus allowing for larger values of α(1).

Remark 4. Interestingly, the above scheme builds on the principle of interference estimation,

quantization and retransmission, which has already been exploited in the different context of

precoding with delayed CSIT (see e.g. [6], [7], [21]). In contrast to these previous works, the

distributed nature of the CSIT is exploited here such that the interference terms are estimated

and transmitted from the TX having the most accurate CSIT, during the same channel use in

which the interference terms are generated.

IV. MAIN RESULTS

As one of the key observations made in this paper, we found that the DoF behavior in a

Network MIMO channel with distributed CSIT quite depends on the CSI quality regime. To this

Page 10: 1 DoF-Robust Strategies for the K-user Distributed ... · by heterogeneous and imperfect backhaul links, as in the Network MIMO context. Such a setting could in particular be obtained

10

end, notions of “weak CSIT” regime and “arbitrary CSIT” regime are introduced to characterize

the interval in which the CSI scaling coefficients α(j) are allowed to take their values. We first

provide results for a given weak CSIT regime and then move on to the arbitrary CSIT regime.

We define a weak-CSIT regime as follows:

Definition 1. In the K-user Network MIMO with distributed CSIT and K ≥ 2, we define a weak

CSIT regime as comprising all the CSIT configurations satisfying that

αmax ≤ 1

1 +K(K − 2). (13)

In the two-user case, this condition reduces to α(j) ≤ 1,∀j ∈ {1, 2}, while in the three-user

case, CSIT is said to be weak if α(j) ≤ 1/4,∀j ∈ {1, 2, 3}, and so forth. Before detailing the

results of achievability in Subsections IV-B and IV-C, we start by providing an outerbound which

will be useful to interpret the following results.

Remark 5. As hinted in Section III, the weak CSIT regime it not uniquely defined. In fact, the

weak-CSIT regime considered above is larger than the one obtained using the simple scheme

described in Section III.

A. Centralized Outerbound

In the following, we prove rigorously the intuitive result that CSIT discrepancies between TXs

does not improve the DoF.

Theorem 1. In the K-user Network MIMO channel with distributed CSIT, the optimal DoF is

upperbounded by the DoF achieved in a centralized CSIT configuration in which all the TXs

can share perfectly their CSI estimates. Specifically, it holds that

DoFDCSI(α) ≤ DoFCCSI (αmax) (14)

where DoFCCSI(α) denotes the DoF achieved in a centralized CSIT configuration with the CSIT

scaling coefficient α [4].

Proof. This intuitive result is proved by considering the outerbound formed by a genie-aided

setting where all the channel estimates are perfectly shared between the TXs. This genie-aided

configuration is a centralized setting as all TXs share the same CSI. Furthermore, because of

Page 11: 1 DoF-Robust Strategies for the K-user Distributed ... · by heterogeneous and imperfect backhaul links, as in the Network MIMO context. Such a setting could in particular be obtained

11

the assumption over the probability distribution of the channel in (5), it holds that

pH|H(1),...,H(K)(H) = O(√

Pαmax

). (15)

After having defined T , {H(1), . . . , H(K)} to represent the total available CSIT, it becomes

clear that it is possible to apply the outerbound derived in [4] for the centralized case. The DoF

of this genie-aided centralized setting is then equal to

DoFCCSI(αmax) = 1 + (K − 1)αmax. (16)

B. Weak CSIT Regime

Let us now consider the weak-CSIT regime defined in Definition 1.

Theorem 2. In the K-user Network MIMO with distributed CSIT, the optimal sum DoF in the

weak CSIT regime defined in Definition 1 satisfies

DoFDCSI(α) = 1 + (K − 1)αmax. (17)

Proof. The outerbound is obtained from Theorem 1 and a scheme achieving this outerbound is

described in Section VI.

In the weak CSIT regime defined, it is then sufficient in terms of DoF to provide a CSI estimate

at a single TX. This surprising result is in strong contrast with the performance obtained using

conventional ZF where the DoF is limited by the worst accuracy across all TXs (more precisely

the DoF is equal to 1 + (K− 1) minj α(j) when considering successive decoding). Note that this

is despite the fact that the ZF approach was recently shown to be DoF optimal for the BC under

centralized CSIT setting [4].

Remark 6. In the two-user case, the weak CSIT condition considered reduces to α(j) ≤ 1,∀j ∈

{1, 2}, such that the notion of weak CSIT coincides with the arbitrary regime. This is in

agreement with the result in [11] that it is possible to achieve 1 + (K − 1) max(α(1), α(2)

)in the 2-user case, for any value of α(1) and α(2).

Page 12: 1 DoF-Robust Strategies for the K-user Distributed ... · by heterogeneous and imperfect backhaul links, as in the Network MIMO context. Such a setting could in particular be obtained

12

C. Achievable DoF for Arbitrary CSIT Regime with K = 3

Going beyond the weak-CSIT regime, we present below a new transmission scheme exploiting

the insights obtained in the weak CSIT regime to achieve a DoF well beyond the DoF achieved

using conventional transmission schemes. Deriving a transmission scheme for any CSIT config-

uration and any number of users is out of the scope of this work and is the topic of ongoing

research within our group.

Theorem 3. In the 3-user Network MIMO with distributed CSIT and α(1) ≥ α(2) ≥ α(3), it holds

that

DoFDCSI(α) ≥

1 + 2α(1) if α(1) ≤ 14

32α(1)−α(2)+2α(1)α(2)

4α(1)−α(2) if α(1) ≥ 14.

(18)

Proof. See the scheme description in Section VII.

Comparing this achievability result with the Centralized Outerbound in Theorem 1 gives the

following corollary.

Corollary 1. The lower bound provided in Theorem 3 for K = 3 users is tight in the weak CSIT

regime defined in Definition 1 and in the arbitrary CSIT regime if α(1) = α(2).

The DoF achieved with the proposed scheme is illustrated in Fig. 3. For α(1) ≤ 14, the

transmission occurs in the weak CSIT regime, and the proposed scheme coincides with the

transmission scheme for the weak CSIT, as described in Section VI. In that regime, the achieved

DoF only depends on the value of the best CSI scaling coefficient α(1), while for larger values

of α(1), the DoF also depends on the value of the second best CSI scaling coefficient α(2).

The proposed D-CSI robust transmission schemes rely on several ingredients which are (i)

Active-Passive (AP-) ZF precoding, (ii) interference quantization, and (iii) superposition coding.

AP-ZF was first introduced with a single so-called passive TX in [11] and we present below

a non-trivial generalization to an arbitrary number of passive TXs and an arbitrary number of

active TXs.

Page 13: 1 DoF-Robust Strategies for the K-user Distributed ... · by heterogeneous and imperfect backhaul links, as in the Network MIMO context. Such a setting could in particular be obtained

13

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 10

0.5

1

1.5

2

2.5

3

α(1)

Sum

DoF

Centralized OuterboundProposed schemeDoF using Conventional ZF [11]

α(2)=α(1) α(2)=α(1)/2

α(2)=0

Fig. 3: Sum DoF as a function of α(1). The DoF achieved is presented for exemplary values of

α(2), while the value of α(3) is set to 0 to emphasize the sensitivity with respect to one estimate.

V. PRELIMINARIES: ACTIVE-PASSIVE ZERO FORCING

Let us consider a setting in which K single-antenna TXs aim to transmit K−n data symbols

to one user (e.g., a user having K − n antennas) while zero-forcing interference to n other

single-antenna users, where 0 < n < K. Within this section, we denote the channel from the

K TXs to the interfered users by H ∈ Cn×K . We divide the TXs between so-called active TXs

and passive TXs and we consider without loss of generality that the first n TXs are the active

TXs while the remaining K − n TXs are the passive ones.

We define the active channel as the channel coefficients from the active TXs, denoted by

Page 14: 1 DoF-Robust Strategies for the K-user Distributed ... · by heterogeneous and imperfect backhaul links, as in the Network MIMO context. Such a setting could in particular be obtained

14

HA ∈ Cn×n, and the passive channel as the channel coefficients from the passive TXs, denoted

by HP ∈ Cn×(K−n), such that

H =[HA HP

]. (19)

This transmission setting considered to introduce AP-ZF is illustrated in Fig. 4.

n Active TXsK-n Passive

TXs

Kn x CH

n Interfered

users

Served user

n)-(Kn x P CHnn x A CH

K-n streams

Fig. 4: Illustration of the transmission scenario considered for AP-ZF.

Turning to the CSIT configuration, we assume that an estimate H(j) ∈ Cn×K is available

at TX j, for j ∈ [K]. We define the estimated active channel H(j)A ∈ Cn×n and the estimated

passive channel H(j)P ∈ Cn×(K−n) similarly to their perfectly known counterparts.

Let us now consider the signal processing at TX j. On the basis of the available CSIT H(j),

TX j computes TAPZF(j) ∈ CK×K−n where the part of the precoder which should be implemented

at the active TXs is denoted by λAPZFTA(j) ∈ Cn×K−n, where λAPZF is used to satisfy an average

sum power constraint (see its exact value in (23)), and is called the active precoder (computed

at TX j) while the part of the precoder which should be implemented at the passive TXs is

Page 15: 1 DoF-Robust Strategies for the K-user Distributed ... · by heterogeneous and imperfect backhaul links, as in the Network MIMO context. Such a setting could in particular be obtained

15

denoted by λAPZFTP ∈ C(K−n)×(K−n) and is called the passive precoder. It then holds that

TAPZF(j) = λAPZF

TA(j)

TP

. (20)

The precoder TP is arbitrarily chosen as any full rank matrix known to all TXs while the

precoder TA(j) is computed as

TA(j) =−((H

(j)A )HH

(j)A +

1

PIn

)−1(H

(j)A )HH

(j)P TP (21)

where P is the sum power of the data symbol transmitted. Note that the precoder TP is a CSI

independent precoder which is commonly agreed upon by all TXs beforehand.

The effective AP-ZF precoder is implemented in a distributed manner and is denoted by

TAPZF ∈ CK×K−n. It is a composite version of the precoders computed at each TX and is hence

given by

TAPZF , λAPZF

eH1 TA(1)

...

eHnTA(n)

TP

(22)

where ei ∈ Cn for i ∈ [n] is the ith row of the identity In and where the normalization

coefficient λAPZF is chosen as

λAPZF ,1√√√√√E

∥∥∥∥∥∥− (HH

AHA + 1P

In)−1

HHAHPTP

TP

∥∥∥∥∥∥2

F

. (23)

This normalization constant λAPZF requires only statistical CSI and can hence be applied at

every TX. It ensures that an average normalization constraint is satisfied, i.e., that

E[‖TAPZF‖2F

]= 1. (24)

Remark 7. The design of the Active precoder in (21) is an extension of the AP-ZF precoder

introduced in [11]. Intuitively, the active precoders invert the channel so as to cancel the

interference generated by the passive TXs. Note also that although TX j computes the full

precoder TAPZF(j), only some coefficients will be effectively used for the transmission due to

the distributed precoding configuration, as shown in (22).

Page 16: 1 DoF-Robust Strategies for the K-user Distributed ... · by heterogeneous and imperfect backhaul links, as in the Network MIMO context. Such a setting could in particular be obtained

16

The key following properties can be easily shown from the precoder design.

Lemma 1. With perfect channel knowledge at all (active) TXs, the AP-ZF precoder with n active

TXs and K − n passive TXs satisfies

HTAPZF? −−−→P→∞

0n×(K−n) (25)

where TAPZF? denotes the AP-ZF precoder based on perfect CSIT and is given as

TAPZF? , λAPZF

TA?

TP

. (26)

Proof. Using the well known Resolvent identity [22, Lemma 6.1], we can write that(HH

AHA +1

PIn

)−1−(HH

AHA

)−1= −

(HH

AHA

)−1( 1

PIn

)(HH

AHA +1

PIn

)−1. (27)

We can then compute the leaked interference as

HTAPZF? = λAPZFHATA? + λAPZFHPTP (28)

(a)= λAPZFHA

(HH

AHA

)−1( 1

PIn

)(HH

AHA +1

PIn

)−1HH

AHPTP (29)

where equality (a) follows from inserting (27) inside the AP-ZF precoder and simplifying.

Letting the available power P tend to infinity, the leaked interference tends to zero.

Lemma 2. The AP-ZF precoder with n active TXs and K − n passive TXs is of rank K − n.

Proof. The passive precoder was chosen such that TP is full rank, i.e., of rank K − n. The

precoder TA(j) is a linear combination of TP for each j, such that the effective AP-ZF pre-

coder TAPZF resulting from distributed precoding is exactly of rank K − n.

Lemma 3. If H(j) , H+√P−α(j)∆(j) for α(j) ∈ [0, 1] with ∆(j) being drawn from a continuous

ergodic distribution with zero mean and bounded full rank covariance matrix, it then holds that∥∥HTAPZF∥∥2F≤ P−minj∈[n] α

(j)

. (30)

Proof. Following a similar approach as in [11], we can use once more the resolvent identity

[22, Lemma 6.1] to approximate the matrix inverse and show that∥∥TAPZF(j) −TAPZF?∥∥2F≤ P−α

(j)

. (31)

Page 17: 1 DoF-Robust Strategies for the K-user Distributed ... · by heterogeneous and imperfect backhaul links, as in the Network MIMO context. Such a setting could in particular be obtained

17

It then follows that ∥∥HTAPZF∥∥2F≤∥∥H (TAPZF −TAPZF?

)∥∥2F

(32)

≤ ‖H‖2F∥∥TAPZF −TAPZF?

∥∥2F

(33)

≤ ‖H‖2F

(n∑j=1

∥∥TAPZF(j) −TAPZF?∥∥2F

)(34)

≤ P−minj∈[n] α(j)

(35)

where (32) follows from Lemma 1 and (35) follows from Lemma 3.

The interpretation behind this result is that the interference attenuation of AP-ZF precoding is

only limited by the CSIT accuracy at the active TXs, and does not depend on the CSI accuracy

at the passive TXs.

Remark 8. Interestingly, it can be seen that the number of passive TXs determines the rank of

the precoder, i.e., the number of streams, and the number of active TXs determines the number

of ZF constraints that are satisfied.

VI. WEAK CSIT REGIME: ACHIEVABLE SCHEME

We now consider the weak CSIT regime and we describe the transmission scheme achieving

the DoF expression given in Theorem 2. Without loss of generality, we assume that the TX with

the best CSIT accuracy is TX 1, i.e., that α(1) = maxj∈[K] α(j).

A. Encoding

The proposed transmission scheme consists in only one channel use during which K− 1 data

symbols of rate α(1) log2(P ) bits are sent to each user (thus leading to K(K − 1) data symbols

being sent in one channel use), while an additional data symbol of data rate (1−α(1)) log2(P ) bits

is broadcast from TX 1. Note that the information which is contained in this broadcast symbol

is not only composed of information bits destined to one user, but is also composed of side

information necessary for decoding the other –private– data symbols, as will be detailed in

Subsection VI-B. The data symbol vector destined to user i is denoted by si ∈ CK−1 while the

broadcast data symbol is denoted by s0 ∈ C.

Page 18: 1 DoF-Robust Strategies for the K-user Distributed ... · by heterogeneous and imperfect backhaul links, as in the Network MIMO context. Such a setting could in particular be obtained

18

RX 1 RX 2 RX 3

3APZF3

H22

APZF2

H21

APZF1

H201,2 sThsThsTh sH3

APZF3

H12

APZF2

H11

APZF1

H101,1 sThsThsTh sH 3

APZF3

H32

APZF2

H31

APZF1

H301,3 sThsThsTh sH

)1(P

P P1-α(1)

Fig. 5: Illustration of the transmission scheme for the weak CSIT regime in the case of K = 3

users.

The transmitted signal x ∈ CK is then equal to

x =

1

0K−1×1

s0 +K∑i=1

TAPZFi si (36)

where

• si ∈ CK−1 contains K−1 data symbols of rate α(1) log2(P ) bits and power Pα(1)/(K(K−

1)) while TAPZFi ∈ CK×(K−1) is the AP-ZF precoder described in Section V, with TX 1

being the only active TX such that the interference are zero-forced at a single user, which

we choose to be user i+ 1 where i+ 1 = i mod [K] + 1.

• s0 ∈ C is a data symbol of rate (1 − α(1)) log2(P ) bits and power P − Pα(1) , and is

transmitted from TX 1 only.

The signal received at user i is then

yi=Hi,1s0︸ ︷︷ ︸.=P

+hHi TAPZF

i si︸ ︷︷ ︸.=Pα

(1)

+hHi

K∑k=1,k 6=i,k 6=i−1

TAPZFk sk︸ ︷︷ ︸

.=(K−2)Pα(1)

+hHi TAPZF

i−1 si−1︸ ︷︷ ︸.=P 0

(37)

where the noise term has been neglected for clarity. The last term in (37) scales as P 0 following

the attenuation by P−α(1) due to AP-ZF with TX 1 being the only active TX, as shown in

Lemma 3. The received signals during this transmission are illustrated in Fig. 5.

Page 19: 1 DoF-Robust Strategies for the K-user Distributed ... · by heterogeneous and imperfect backhaul links, as in the Network MIMO context. Such a setting could in particular be obtained

19

B. Interference Estimation and Quantization at TX 1

The data symbol s0 is used to convey to the users side information allowing to decode

their destined data symbols. More specifically, TX 1 uses its local CSIT H(1) to estimate the

interference terms hHi TAPZF

k sk for k 6= i, k 6= i− 1 that is going to be generated by the private

data symbols si,∀i ∈ [K]. Each interference term has a power scaling in Pα(1) such that using

α(1) log2(P ) bits, each term can be quantized with a quantization noise at the noise floor [20].

It can be seen by inspection that there are in total K(K − 2) such interference terms. In the

weak interference regime considered, it holds by definition that K(K − 2)α(1) ≤ 1− α(1) such

that these K(K− 2)α(1) log2(P ) bits can be transmitted via the common data symbol s0 of data

rate (1 − α(1)) log2(P ) bits. If the previous inequality is strict, these bits are completed with

information bits destined to any particular user.

C. Decoding and DoF Analysis

It remains to verify that this scheme leads to the claimed DoF. Let us consider without loss of

generality the decoding at user 1 as the decoding at the other users will follow with a circular

permutation of the user’s indices.

Using successive decoding, the data symbol s0 is decoded first, followed by s1. The data

symbol s0 of rate of (1−α(1)) log2(P ) bits can be decoded with a vanishing probability of error

as its SINR can be seen in (37) to scale as P 1−α(1) .

Upon decoding s0, the estimated interferences (h(1)1 )HTAPZF

k sk, k ∈ {2, . . . , K − 1} are

obtained (up to the quantization noise at the noise floor). It holds that

(h(1)1 )HTAPZF

k sk = hH1 TAPZF

k sk + P−α(1)

(δ(1)1 )HTAPZF

k sk︸ ︷︷ ︸.=P 0

(38)

such that subtracting the estimated interference from the received signals can be done perfectly

in terms of DoF.

Remark 9. Note that TX 1 knows perfectly the effective precoder used in the transmission as

he is the only active TX.

After having decoded s0 and subtracted the quantized interference terms, the remaining signal

at user 1 is then (up to the noise floor)

y1 = hH1 TAPZF

1 s1. (39)

Page 20: 1 DoF-Robust Strategies for the K-user Distributed ... · by heterogeneous and imperfect backhaul links, as in the Network MIMO context. Such a setting could in particular be obtained

20

The estimated interference terms (h(1)i )HT

APZF(1)1 s1, i = 3, . . . , K, which have been obtained

through s0, are then used by user 1 to form a virtual received vector yv1 ∈ CK−1 equal to

yv1 ,

hH

1

(h(1)3 )H

...

(h(1)K )H

TAPZF1 s1. (40)

Each component of yv1 has a SINR scaling in Pα(1) and the AP-ZF precoder is of rank K − 1

(See Lemma 2) such that user 1 can decode its desired K − 1 data symbols, each with the rate

of α(1) log2(P ) bits.

Considering all users, K(K − 1)α(1) log2(P ) bits are transmitted through the private data

symbols and (1−α(1)−K(K − 2)α(1)) log2(P ) bits to any particular user through the common

data symbol s0. Adding the two expressions yields the claimed DoF.

VII. ARBITRARY CSIT REGIME FOR K = 3

In the arbitrary CSIT setting, finding an efficient transmission scheme adapted to all the

possible CSIT configurations is made challenging by the fact that the CSIT configuration is

characterized by K CSIT scaling coefficients. Consequently, there are many different CSIT

regimes and the transmission scheme needs to be very adaptive. Therefore, we provide in the

following an efficient heuristic scheme for the case of K = 3 users, while the extension of the

same ideas to K users is left for further works.

A. Main Principle

The first phase of the scheme is exactly the same as the scheme presented for the weak CSIT

regime in Section VI. If the transmission occurs in the weak CSIT regime, then the scheme

coincides with the scheme presented above. However, outside the weak CSIT regime, it holds

that K(K−2)α(1) > 1−α(1) such that all it is not possible to transmit to each user sufficient side

information to decode its desired private data symbols. Consequently, we resort to a second phase

of the transmission, in successive channel uses, during which the interference terms computed

at TX 1 that could not yet be transmitted, are taken care of.

During the second phase, the private data symbols are transmitted using AP-ZF with 2 active

TXs (TX 1 and TX 2) and the power Pα(2) . The use of 2 Active TXs with a lower power has for

Page 21: 1 DoF-Robust Strategies for the K-user Distributed ... · by heterogeneous and imperfect backhaul links, as in the Network MIMO context. Such a setting could in particular be obtained

21

consequence that interferences generated remain at the noise floor. Indeed, AP-ZF with k active

TXs is able to ZF interference at k users (See Section V), and the interference attenuation is

limited by the worst accuracy across the Active TXs (See Lemma 3). As a consequence, this

second phase does not generate any additional interference (in terms of DoF), such that the

common data symbol can be used to retransmit solely the interference generated during the first

phase.

This second phase is repeated until sufficient side information (i.e., quantized estimated

interference terms) have been transmitted to the users to decode the private data symbols emitted

during the first phase.

B. Encoding

As explained above, only the transmission during the second phase needs to be described.

The transmitted signal is then given by

x =

1

0

0

s0 +3∑i=1

t′APZFi s′i (41)

where

• s′i ∈ C is a private data symbol destined to user i, with power Pα(2)/3 and rate α(2) log2(P ) bits.

The AP-ZF precoder t′APZFi is designed with 2 active TXs –TX 1 and TX 2– and with one

passive TX –TX 3–. Consequently, the interferences can be zero-forced at both interfered

users (See Section V).

• s′0 ∈ C is a common data symbol, with power P − Pα(2) and rate (1 − α(2)) log2(P ) bits,

transmitted from TX 1 only.

The received signals at the users are then given by

y′1 = H1,1s0︸ ︷︷ ︸.=P

+hH1 t′APZF1 s′1︸ ︷︷ ︸.=Pα

(2)

+hH1 t′APZF2 s′2 + hH

1 t′APZF3 s′3︸ ︷︷ ︸

.=P 0

y′2 = H2,1s0︸ ︷︷ ︸.=P

+hH2 t′APZF2 s′2︸ ︷︷ ︸.=Pα

(2)

+hH2 t′APZF1 s′1 + hH

2 t′APZF3 s′3︸ ︷︷ ︸

.=P 0

y′3 = H3,1s0︸ ︷︷ ︸.=P

+hH3 t′APZF3 s′3︸ ︷︷ ︸.=Pα

(2)

+hH3 t′APZF1 s′1 + hH

3 t′APZF2 s′2︸ ︷︷ ︸

.=P 0

(42)

Page 22: 1 DoF-Robust Strategies for the K-user Distributed ... · by heterogeneous and imperfect backhaul links, as in the Network MIMO context. Such a setting could in particular be obtained

22

RX 1 RX 2 RX 3

P

3APZF3

H12

APZF2

H11

APZF1

H101,1 ''''''' sthsthsth sH

)2(P

3APZF3

H22

APZF2

H21

APZF1

H201,2 ''''''' sthsthsth sH 3

APZF3

H32

APZF2

H31

APZF1

H301,3 ''''''' sthsthsth sH

P1-α(2)

Fig. 6: Illustration of the second phase of the transmission in the arbitrary CSIT regime for

K = 3.

where the noise realizations have been neglected. The last terms of the received signals scale as

P 0 due to the attenuation by P−α(2) from AP-ZF with TX 1 and TX 2 being Active TXs (See

Lemma 3).

This transmission scheme is illustrated in Fig. 6.

C. DoF Analysis

The common data symbol is decoded first and its contribution to the received signal is removed.

This is possible with a vanishing probability of error as the SNR at each user scales in P 1−α(2) .

Using successive decoding, each user can then decode with a vanishing probability of error its

desired data symbol from the received signal. Thus, a sum DoF equal to 3α(2) is achieved during

each channel use of the second phase.

This second phase lasts until the totality of the quantized estimated interferences have been

successfully broadcast, i.e., during d(4α(1) − 1)/(1 − α(2))e channel uses. The impact of the

ceiling operator is made arbitrary small by repeating the first phase n1 times and the second

phase n2 times, with n1 and n2 chosen such that (4α(1)− 1)/(1−α(2)) is arbitrarily close to its

next integer. Consequently, we omit in the following the ceiling operator for the sake of clarity.

A sum DoF of 6α(1) is achieved during the first phase (conditioned on the successful retrans-

mission of the quantized estimated interferences) while a sum DoF of 3α(2) is achieved during

each channel use of the second phase. As the second phase lasts for (4α(1) − 1)/(1 − α(2))

Page 23: 1 DoF-Robust Strategies for the K-user Distributed ... · by heterogeneous and imperfect backhaul links, as in the Network MIMO context. Such a setting could in particular be obtained

23

channel uses, the DoF achieved by the full transmission scheme is

DoF =6α(1) + 4α(1)−1

1−α(2) 3α(2)

1 + 4α(1)−11−α(2)

= 32α(1) − α(2) + 2α(1)α(2)

4α(1) − α(2)

(43)

which is the claimed DoF, and concludes the proof.

VIII. CONCLUSION

We have described a new D-CSIT robust transmission schemes improving over the DoF

achieved by conventional precoding approaches when faced with distributed CSIT. As a first step,

we have derived an outerbound for the DoF achieved with D-CSIT, coined as the Centralized

Outerbound, and consisting in a genie-aided setting where all the CSI versions are made available

at all TXs. We have then uncovered the surprising result that in a certain “weak CSIT regime”,

it is possible to achieve this Centralized Outerbound in a D-CSIT configuration with CSIT

handed at a single TX. The robust precoding schemes proposed rely on new methods such

as the estimation of the interference and their transmission from a single TX, and the AP-ZF

precoding with multiple Passive TXs and multiple Active TXs. These new methods have a strong

potential for improvement in other wireless configurations with distributed CSIT. Deriving an

optimal transmission scheme for an arbitrary number of users and an arbitrary CSIT configuration

is a challenging and interesting research problem.

IX. ACKNOWLEDGMENT

The authors are grateful to Petros Elia, Dirk Slock and Shlomo Shamai for interesting and

helpful discussions.

APPENDIX

For the sake of completeness, we start by recalling the following result on multivariate

Gaussian distribution.

Theorem 4. [23] Let X and Y be centered and jointly Gaussian with covariance matrix KXX

and KYY. Assume that KYY > 0. Then the conditional distribution of X conditional on Y = y

Page 24: 1 DoF-Robust Strategies for the K-user Distributed ... · by heterogeneous and imperfect backhaul links, as in the Network MIMO context. Such a setting could in particular be obtained

24

is a multivariate Gaussian of mean

E[XYH

]K−1YYy. (44)

and covariance matrix

KXX − E[XYH

]K−1YYE

[YXH

]. (45)

For ease of notation, we will in the following consider the vectorized versions of the channel

and channel estimates, which we denote by h and h(j),∀j ∈ [K], respectively. Applying

Theorem 4, the conditional distribution ph|h(1),...,h(K) is multivariate Gaussian. Our goal is to

compute the covariance matrix of this conditional distribution, denoted by K. Before writing it

explicitly, we introduce the shorthand notation I ∈ CK3×K2 as

I ,[IK2 . . . IK2

]T

︸ ︷︷ ︸Ktimes

(46)

and Σ ∈ CK3×K3 as

Σ ,

P−α

(1)IK2

. . .

P−α(K)

IK2

. (47)

With these notations, the covariance matrix K is then written using Theorem 4 as

K = IK2 − IT [I IT + Σ]−1

I (48)

(a)= IK2 − ITΣ−1I + ITΣ−1I

[IK2 + ITΣ−1I

]−1ITΣ−1I (49)

(b)= IK2 −

[IK2 + ITΣ−1I

]−1ITΣ−1I (50)

= IK2 −

[IK2 +

K∑j=1

Pα(j)

IK2

]−1( K∑j=1

Pα(j)

IK2

)(51)

=1

1 +∑K

j=1 Pα(j)

IK2 (52)

where equality (a) follows from the Matrix Inversion Lemma [24, Chapter 3.1.1] and equality (b)

follows from basic algebraic manipulations. Hence, the conditional probability density function

is Gaussian with the variance of its elements scaling in P−αmax such that it satisfies that

max(ph|h(1),...,h(K)(h)).=√Pαmax . (53)

Page 25: 1 DoF-Robust Strategies for the K-user Distributed ... · by heterogeneous and imperfect backhaul links, as in the Network MIMO context. Such a setting could in particular be obtained

25

REFERENCES

[1] G. Caire and S. Shamai (Shitz), “On the achievable throughput of a multiantenna Gaussian Broadcast Channel,” IEEE

Trans. Inf. Theory, vol. 49, no. 7, pp. 1691–1706, 2003.

[2] S. A. Jafar and A. J. Goldsmith, “Isotropic fading vector Broadcast Channels: The scalar upper bound and loss in degrees

of freedom,” IEEE Trans. Inf. Theory, vol. 51, no. 3, pp. 848–857, Mar. 2005.

[3] M. W. Amos Lapidoth, Shlomo Shamai, “On the capacity of fading MIMO Broadcast Channels with imperfect transmitter

side-information,” 2006. [Online]. Available: http://arxiv.org/pdf/cs/0605079.pdf

[4] A. G. Davoodi and S. A. Jafar, “Aligned image sets under channel uncertainty: Settling conjectures on the collapse of

Degrees of Freedom under finite precision CSIT,” IEEE Trans. Inf. Theo., vol. 62, no. 10, pp. 5603–5618, Oct. 2016.

[5] M. Maddah-Ali and D. Tse, “Completely stale transmitter channel state information is still very useful,” IEEE Trans. Inf.

Theory, vol. 58, no. 7, pp. 4418–4431, Jul. 2012.

[6] T. Gou and S. Jafar, “Optimal use of current and outdated channel state information: Degrees of freedom of the MISO

BC with mixed CSIT,” IEEE Communications Letters, vol. 16, no. 7, pp. 1084–1087, Jul. 2012.

[7] S. Yang, M. Kobayashi, D. Gesbert, and X. Yi, “Degrees of freedom of time correlated MISO Broadcast Channel with

delayed CSIT,” IEEE Trans. Inf. Theory, vol. 59, no. 1, pp. 315–328, Jan. 2013.

[8] R. Tandon, S. A. Jafar, S. Shamai (Shitz), and H. V. Poor, “On the synergistic benefits of alternating CSIT for the MISO

BC,” IEEE Trans. Inf. Theory, vol. 59, no. 7, pp. 4106–4128, 2013.

[9] J. Chen and P. Elia, “Toward the performance versus feedback tradeoff for the two-user MISO Broadcast Channel,” IEEE

Trans. Inf. Theory, vol. 59, no. 12, pp. 8336–8356, Dec. 2013.

[10] M. A. Maddah-Ali and U. Niesen, “Fundamental limits of Caching,” IEEE Trans. Inf. Theory, vol. 60, no. 5, pp. 2856–2867,

May 2014.

[11] P. de Kerret and D. Gesbert, “Degrees of freedom of the network MIMO channel with distributed CSI,” IEEE Trans. Inf.

Theory, vol. 58, no. 11, pp. 6806–6824, Nov. 2012.

[12] Q. Li, P. de Kerret, D. Gesbert, and N. Gresset, “Robust regularized ZF in decentralized Broadcast Channel with correlated

CSI noise,” in Proc. Allerton Conference on Communication, Control, and Computing (Allerton), 2015.

[13] P. de Kerret, R. Fritzsche, D. Gesbert, and U. Salim, “Robust precoding for network MIMO with hierarchical CSIT,” in

Proc. IEEE International Symposium on Wireless Communication Systems (ISWCS), 2014.

[14] R. Fritzsche and G. Fettweis, “Distributed robust sum rate maximization in cooperative cellular networks,” in Proc. IEEE

Workshop on Cooperative and Cognitive Mobile Networks (CoCoNet), 2013.

[15] X. Rao, L. Ruan, and V. K. N. Lau, “CSI feedback reduction for MIMO interference alignment,” IEEE Trans. Signal

Process., vol. 61, no. 18, pp. 4428–4437, Sept. 2013.

[16] P. de Kerret and D. Gesbert, “Interference alignment with incomplete CSIT sharing,” IEEE Trans. Wireless Commun.,

vol. 13, no. 5, pp. 2563–2573, May. 2014.

[17] C. Hao and B. Clerckx, “Degrees-of-Freedom of the K-user MISO interference channel with delayed local CSIT,” in Proc.

IEEE International Conference on Communications (ICC), 2015.

[18] N. Lee, R. Tandon, and R. W. Heath, “Distributed space-time Interference Alignment with moderately Delayed CSIT,”

IEEE Trans. Wireless Commun., vol. 14, no. 2, pp. 1048–1059, Feb. 2015.

[19] N. Jindal, “MIMO Broadcast Channels with finite-rate feedback,” IEEE Trans. Inf. Theory, vol. 52, no. 11, pp. 5045–5060,

Nov. 2006.

[20] T. Cover and A. Thomas, Elements of information theory. Wiley-Interscience, Jul. 2006.

Page 26: 1 DoF-Robust Strategies for the K-user Distributed ... · by heterogeneous and imperfect backhaul links, as in the Network MIMO context. Such a setting could in particular be obtained

26

[21] P. de Kerret, D. Gesbert, J. Zhang, and P. Elia, “Optimally Bridging the Gap from Delayed to Perfect CSIT in the K-user

MISO BC,” in Proc. IEEE Information Theory Workshop (ITW), 2016.

[22] R. Couillet and M. Debbah, Random matrix methods for wireless Communications. Cambridge University Press, 2011.

[23] A. Lapidoth, A foundation in Digital communication. Cambridge University Press, 2009.

[24] K. B. Petersen and M. S. Pedersen, The Matrix Cookbook, Nov. 2012. [Online]. Available: http://matrixcookbook.com